Hidden markov models-based anomaly correlations for the cyber-physical security of ev charging stations

M Girdhar, J Hong, H Lee… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Over recent years, we have seen a significant rise in electric mobility to overcome the
anthropogenic emissions by conventional gasoline vehicles. However, the prerequisite of …

Detecting anomalies in intelligent vehicle charging and station power supply systems with multi-head attention models

Y Li, L Zhang, Z Lv, W Wang - IEEE Transactions on Intelligent …, 2020 - ieeexplore.ieee.org
Safe and reliable intelligent charging stations are imperative in an intelligent transportation
infrastructure. Over the past few years, a big number of smart charging stations have been …

DPRF: a differential privacy protection random forest

J Hou, Q Li, S Meng, Z Ni, Y Chen, Y Liu - Ieee Access, 2019 - ieeexplore.ieee.org
Providing privacy protection for classification algorithms has become a research hotspot in
current data mining. In this paper, differential privacy is applied to the random forest …

GLIDE: A Game Theory and Data‐Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks

Q Li, J Hou, S Meng, H Long - Complexity, 2020 - Wiley Online Library
The real‐time and high‐continuity requirements of the edge computing network gain more
and more attention because of its active defence problem, that is, a data‐driven complex …

DDoS attack detection based on random forest

Y Chen, J Hou, Q Li, H Long - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
With the development of network technology, distributed denial of service (DDoS) attacks
have increasingly become an important security risk that endangers the network. It uses …

Preventive maintenance for heterogeneous industrial vehicles with incomplete usage data

D Markudova, S Mishra, L Cagliero, L Vassio… - Computers in …, 2021 - Elsevier
Large fleets of industrial and construction vehicles require periodic maintenance activities.
Scheduling these operations is potentially challenging because the optimal timeline …

Intelligent processing of intrusion detection data

T Duan, Y Tian, H Zhang, Y Liu, Q Li, J Jiang… - IEEE Access, 2020 - ieeexplore.ieee.org
Intrusion detection technology, as an active and effective dynamic network defense
technology, has rapidly become a hot research topic in the field of network security since it …

A safety fault diagnosis method on industrial intelligent control equipment

H Zhang, Q Li, S Meng, Z Xu, C Lv, C Zhou - Wireless Networks, 2022 - Springer
With the increasing complexity and cost of industrial control systems and the rapid
development of information technology, the tolerance of industrial control equipment to …

[HTML][HTML] A security event description of intelligent applications in edge-cloud environment

Q Li, X Yin, S Meng, Y Liu, Z Ying - Journal of Cloud Computing, 2020 - Springer
In traditional network environment, the attack topology of the network is usually obtained
based on a graph traversal algorithm. It uses connection relationships to describe the …

Security control components for epidemic prevention donation management blockchain

S Wang, Q Li, J Hou, J Jiang - Proceedings of the 2nd ACM International …, 2020 - dl.acm.org
After the outbreak of the new coronavirus pneumonia, it has been broadcasting soon.
Medical supplies are out of used. Chinese people have provided medical supplies and …